Hosting Industry Demystified

Network Hardware Security To Defend Business Processes

Network Hardware Security is increasingly becoming critical as the industry moves into IoT and 5G. It's an essential part of evolved networks where security functions, policies, and related configurations get dynamically deployed and adjusted across multi-vendor domains. The network hardware technology should help to defend critical business processes against attack and disruption, protect privacy, and support policy and regulatory compliance controls.

Switches, hubs, and routers are main network hardware components, which act as a gateway for user communication to the outside world. They are the single point of failures, hence to avoid their compromise some common security measures are applied.

Steps to take for Network Hardware Security

Disable telnet services, if remote administrative control not needed.

Block or filter access to un-used sensitive ports.

Use hardware provided session verifications or time-outs, as this prevents hackers from snooping sessions or hijacking.

BIOS Passwords: Extra security layer to protect users from snooping, preventing malicious users from accessing system. Setup single-user password as default setup keys and password of nearly all manufacturers are well known. Security Issue: BIOS passwords get wiped out by shorting out the CMOS battery.

Change defaults and set administrative, maintenance and user passwords to prevent attackers from gaining access. New passwords should differ from other administrative passwords on the network.

Employ encryption to the router, which by default is disabled.

Network Hardware Security of some well-known devices

Compaq Netelligent Unmanaged Hub

It offers connectivity by creating mini LAN with two or more peripheral devices in medium and large businesses. At a very affordable price, with high performance and reliability LAN connectivity is provided. The devices have multicolored LED's indicating overall status including power, link, collision, port partition, and port traffic. It has network utilization monitor which indicates the network's performance for easy management and troubleshooting. Furthermore, designed to monitor and keep a hub operating near maximum efficiency.

Security Issue: The default password for superuser is well known, which is required to be changed.

3Com switches

Serves intelligent endpoint in a network requiring high performance, QoS, and enterprise-level security and management. Links wireless and wired voice and data networks in small and medium-size businesses with inexpensive convergence. All models equipped with copper and small form-factor pluggable Gigabit uplinks and clustered stacking capabilities, which allow clustered switches configurations up to 32 units.

Flavors: PoE and non-PoE. The PoE capabilities provide inline power to attached devices, such as access points, VoIP phones, and IP security cameras.

Ascend Pipeline/MAX

Security Issue: Lucent Ascend MAX Router 5.0 and earlier, Lucent Ascend Pipeline Router 6.0.2 and earlier and Lucent DSLTerminator allows remote attackers to obtain sensitive information such as hostname, MAC, and IP address of the Ethernet interface via a discard (UDP port 9) packet, which causes the device to leak the information in the response. Attackers can cause a denial of service with a malformed packet to the discard port, used by the Java Configurator tool.

Breezecom adaptors

Security Issue: It used hard-coded passwords, now widely distributed. Although, it enables the support team to access BreezeCOM equipment.

Cisco IOS

It's security integrated into the network and is a critical component of the Cisco Self-Defending Network. The software delivers a sophisticated set of security capabilities for a comprehensive, layered security approach throughout your network infrastructure.

Web Hosting Review

It’s never been easier to compare web hosts.

Ananova Pillars

Taking the guesswork out of web hosting

Ananova is the Consumer Reports of web hosting – the trusted source anyone can go to for thorough, current, and honest reviews so they can make the most educated decisions and investments possible when choosing a web hosting providers.

Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here:
Cookie Policy

Data-Driven Reviews

Current & accurate reviews are based on data and supported by real user experiences.

The goal is to deliver the most accurate information possible based on the needs of the majority of website owners and developers, and Ananova reports deliver the most reliable indicators of web host performance.